Lack of CLM maturity is putting organizations at risk

More than a year after the historic and damaging SolarWinds attack, nearly 65% of organizations still are unable to secure and govern the growing volume of machine and application identities in the form of digital certificates, the backbone of enterpri… Continue reading Lack of CLM maturity is putting organizations at risk

What’s holding back zero trust implementation for device access?

A study by Infinipoint has revealed a significant gap between a high level of interest in zero trust for device access yet relatively low adoption due to obstacles in implementation. Surveying 388 IT and security professionals, the study explores the c… Continue reading What’s holding back zero trust implementation for device access?

Why machine identities matter (and how to use them)

The migration of everything to the cloud and corresponding rise of cyberattacks, ransomware, identity theft and digital fraud make clear that secure access to computer systems is essential. When we talk about secure access, we tend to think about human… Continue reading Why machine identities matter (and how to use them)

Cybersecurity Red Team 101

“Red Team” is an expression coined in the 19th century, related to German military preparedness exercises conducted as realistic board games between two adversaries operating under time constraints and certain rules. In cybersecurity, Red Team exercise… Continue reading Cybersecurity Red Team 101

How to contain a privileged access breach and make sure it doesn’t happen again

When attackers pull off a privileged access breach, they have a beachhead into your network. Regardless of whether it’s software or users that are ill-protected, threat actors have a consistent playbook: establish a foothold on a vulnerable system, ele… Continue reading How to contain a privileged access breach and make sure it doesn’t happen again

What is fueling the adoption of passwordless authentication?

An identity and access management research report from Enterprise Strategy Group (ESG), finds organizations, frustrated with poor user experience and weak security, are moving towards adopting passwordless, continuous authentication. The impact of adop… Continue reading What is fueling the adoption of passwordless authentication?

SDP solutions are true ZTNA solutions: They trust no one

In this interview with Help Net Security, Alissa Knight, cybersecurity influencer and partner at Knight Ink, explains why organizations should switch to SDP as opposed to VPN, and how this approach can help boost their cybersecurity posture. As the pan… Continue reading SDP solutions are true ZTNA solutions: They trust no one

Authorization is bridging the gap between security and IAM

PlainID published a report, based on research conducted among IT and security professionals in North America and the UK. Among its headline findings, the report reveals that authorization is the rising priority in identity and access management (IAM), … Continue reading Authorization is bridging the gap between security and IAM

83% of employees continue accessing old employer’s accounts

In a recent study, Beyond Identity gathered responses from former employees across the United States, the United Kingdom, and Ireland and found 83% of employees admitted to maintaining continued access to accounts from a previous employer. The cybersec… Continue reading 83% of employees continue accessing old employer’s accounts

Why identity and access management strategies need a booster

In this interview with Help Net Security, Miles Hutchinson, CISO of Jumio, talks about the pain points of identity and access management and the importance of strenghtening identity strategies. After a year of major cyberattacks, it’s clear that … Continue reading Why identity and access management strategies need a booster